{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T12:17:26Z","timestamp":1752668246077,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/iotsms.2018.8554805","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:54:17Z","timestamp":1543884857000},"page":"107-114","source":"Crossref","is-referenced-by-count":5,"title":["Using RBAC to Enforce the Principle of Least Privilege in Industrial Remote Maintenance Sessions"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Kern","sequence":"first","affiliation":[]},{"given":"Reiner","family":"Anderl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/j.ifacol.2015.06.143","article-title":"Towards Industry 4.0 - Standardization as the crucial challenge for highly modular, multi-vendor production systems","volume":"3","author":"weyer","year":"2015","journal-title":"IFAC-Pape rsOnLine"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2017.01.048"},{"journal-title":"Federal Office for Information Security Industrial Control System Security - Top 10 Threats and Countermeasures 2016","year":"2016","key":"ref10"},{"journal-title":"Federal Office for Information Security Remote maintenance in industrial environments","year":"2015","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300834"},{"key":"ref13","first-page":"241","article-title":"Role-Based Access Control (RBAC): Features and Motivations","author":"ferraiolo","year":"1995","journal-title":"Proceedings of 11 th annual computer security application conference"},{"key":"ref14","first-page":"26","article-title":"Access control and session management in the HTTP environment","author":"kurt","year":"2001","journal-title":"IEEE Internet Computing 5 1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1997.646185"},{"journal-title":"ISO 27000","year":"2017","key":"ref17"},{"key":"ref18","first-page":"6","article-title":"Analysis of DAC MAC RBAC Access Control based Models for Security","author":"bokefode","year":"2014","journal-title":"International Journal of Computer Applications 104 5"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/978-3-642-31540-4_4","article-title":"A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC","volume":"7371","author":"jin","year":"2012","journal-title":"Data and Applications Security and Privacy XXVI"},{"journal-title":"Lebenszykluskosten optimieren Paradigmenwechsel f&#x00FC;r Anbieter und Nutzer von In-vestitionsgiitern 1 Aufl OCLC 269453821 Wies-baden Gabler","year":"2009","author":"schweiger","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21236\/ADA023588"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref3","first-page":"1","article-title":"Paranoid Penguin: An Introduction to Novell AppArmor","author":"mick","year":"2006","journal-title":"Linux J"},{"key":"ref6","first-page":"42","article-title":"Adaptive Solutions for Access Control within Pervasive Healthcare Systems","author":"kukhun","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"ref29","first-page":"139","article-title":"Implementing SELinux as a Linux security module","volume":"43","author":"smalley","year":"2001","journal-title":"NAI Labs Report"},{"journal-title":"A dictionary of Information Security Terms Abbreviations and Acronyms Cambridgeshire United Kingdom IT Governance Publishing","year":"2007","author":"calder","key":"ref5"},{"journal-title":"IT-Sicherheit Konzepte - Verfahren - Protokolle 8 Aufl M&#x00FC;nchen","year":"2013","author":"claudia","key":"ref8"},{"key":"ref7","first-page":"92","article-title":"ISO\/IEC 27000, 27001 and 27002 for Information Security Management","volume":"2","author":"georg","year":"2013","journal-title":"Journal of Information Security"},{"key":"ref2","first-page":"20","article-title":"Methods for Access Control: Advances and Limitations","volume":"301","author":"ryan","year":"2001","journal-title":"Harvey Mudd College"},{"journal-title":"Federal Office for Information Security Grundregeln zur Absicherung von Fernwartungszug&#x00E4;ngen","year":"2013","key":"ref9"},{"journal-title":"auditd(8) Audit daemon - Linux man page","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref22","article-title":"Building Secure Software - A Difficult But Critical Step in Protecting Your Business","author":"gary","year":"2002","journal-title":"RTO\/NATO Real-Time Intrusion Detection Symposium RTO\/NATO Real-Time Intrusion Detection Symposium Cigital"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68899-0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507717"},{"key":"ref23","article-title":"Linux security modules: General security support for the linux kernel","author":"morris","year":"2002","journal-title":"USENIX Security Symposium"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/354876.354878"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501992"}],"event":{"name":"2018 Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS)","start":{"date-parts":[[2018,10,15]]},"location":"Valencia","end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Internet of Things: Systems, Management and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537438\/8554379\/08554805.pdf?arnumber=8554805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:16:06Z","timestamp":1643249766000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554805\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iotsms.2018.8554805","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}